Last Updated on March 20, 2026 by Matthew Goodchild
Q2 2026: Employee Best Practices & CG's Cloudtango Recognition
Short, actionable updates on what we're seeing across the IT and cybersecurity landscape — along with real-world examples of how we help businesses strengthen security, reduce risk, and improve system performance.
5 Technology Habits Every Employee Should Follow
As part of our ongoing effort to keep your systems secure and running smoothly, here are five best practices all employees should follow. These guidelines reduce common risks, improve reliability, and help ensure a consistent experience across your environment.
While many of these may seem routine, they play an important role in preventing security incidents and minimizing disruptions to day-to-day work.
-
1
Use Strong, Unique Passwords
Avoid reusing passwords across multiple systems. Use a combination of letters, numbers, and symbols — or better yet, long passphrases (multiple random words) that are easier to remember and harder to crack. Consider a password manager to keep track of them securely. Never share your passwords with others.
ReferenceHow Safe Is Your Password?
Estimated time for a computer to crack a password by length and complexityCharacters Lowercase only + Uppercase + Number + Symbol 1–6 Instantly Instantly Instantly Instantly 7 Instantly Instantly 1 min 6 min 8 Instantly 22 min 1 hr 8 hrs 9 2 min 19 hrs 3 days 3 wks 10 1 hr 1 mth 7 mths 5 yrs 11 1 day 5 yrs 41 yrs 400 yrs 12 3 wks 300 yrs 2,000 yrs 34,000 yrs Source: Security.org via Statista -
2
Enable Multi-Factor Authentication
Whenever available, MFA adds an extra layer of protection by requiring a second verification step — a mobile app prompt, text message, or hardware token. Even if your password is compromised, MFA significantly reduces the risk of unauthorized access. Always approve prompts only when you are actively signing in.
-
3
Keep Devices Updated
Regular updates ensure your system has the latest security patches. Allow updates to install when prompted, or restart your device regularly. Delaying updates leaves your device exposed to known vulnerabilities — this applies to operating systems, browsers, and all installed applications.
-
4
Use Secure Networks
Avoid accessing company systems over public Wi-Fi (coffee shops, airports). These networks are often unsecured and can expose your data. If you must connect remotely, always use a VPN to encrypt your traffic. At home, ensure your Wi-Fi uses a strong password and modern encryption (WPA2 or WPA3).
-
5
Store Files in Approved Locations
Save work files in company-approved platforms — shared drives or sanctioned cloud storage — to ensure proper backup, version control, and access management. Avoid storing important data locally on your device or using personal storage services. This prevents data loss and ensures your team can access files when needed.
What's on the Horizon for the Rest of 2026
As technology continues to evolve, we're seeing a growing focus on AI-driven tools, increased cybersecurity risks, and more complex cloud environments. These changes bring both opportunities and new challenges for organizations.
-
Strengthening security controls, including phishing protection and account security across all client environments.
-
Improving visibility across systems and devices to detect issues before they become incidents.
-
Supporting users with tools and guidance to work more efficiently and securely as AI-driven workflows become mainstream.
We'll continue sharing additional tips and updates to help you stay informed and prepared. As always, if something doesn't look right or you have questions, reach out to us.
CG Technologies Named to Cloudtango MSP Select 2026
We're pleased to share that CG Technologies has been recognized on Cloudtango's MSP Select 2026, a list highlighting top-performing managed service providers across Canada.
MSP Select
This recognition reflects our continued focus on delivering reliable IT services, maintaining strong customer satisfaction, and supporting clients through an increasingly complex technology landscape.
Cloudtango's MSP Select evaluates providers based on technical expertise, innovation, and customer outcomes. Being included on this list reinforces our commitment to providing practical, effective solutions that help businesses operate securely and efficiently.
As organizations rely more heavily on cloud platforms, multi-vendor environments, and AI-driven tools, the need for resilient and secure IT infrastructure continues to grow — as do the cybersecurity threats that come with it. We appreciate the trust our clients place in us and will continue delivering consistent, high-quality IT support.
Proactive IT & Cybersecurity That Scales With Your Business
Get in Touch